Enterprise

Cyber Hygiene Analytics module

Description Availability
Basic Insights Advanced Insights
Identify Smart Device Inventory

Analytics Dashboards

 

Continuously monitor, track and report on the control coverage of devices identified from connected data sources.

 

Included Available
Control Coverage

Analytics Dashboards

 

Continuously monitor, track and report on the coverage of security controls.

 

Included Available
Protect Identity and Access Management Analytics Dashboards

 

Continuously monitor, track and report on the assignment, use and appropriateness of system and application accounts. Included Details upon request
Configuration Management Analytics Dashboards

 

Continuously monitor, track and report on alignment/deviation from standard secure configurations.

 

Details upon request Details upon request
Privileged Access Management Analytics Dashboards

 

Continuously monitor, track and report on the assignment, use and appropriateness of administrative privileges.

 

Details upon request Details upon request
Data Loss Prevention Analytics Dashboards

 

Continuously monitor, track and report on the tools and processes used to prevent data loss.

 

Details upon request Details upon request
Phishing Awareness Training Analytics Dashboards

 

Continuously monitor, track and report on the tools and processes used to conduct phishing awareness training.

 

Included Details upon request
Detect Vulnerability & Patch Management Analytics Dashboards

 

Continuously monitor, track and report on the vulnerability and patch performance of devices in the inventory.

 

Included Available
Malware Defences Analytics Dashboards Continuously monitor, track and report on the installation, configuration and operational effectiveness of anti-malware solutions.

 

Included Details upon request
Application Security Analytics Dashboards

 

Continuously monitor, track and report on the Application security vulnerability program.

 

Included Details upon request
  Device Viewer

Entity Search and Analytics

 

Search and view devices to understand the value at risk at the entity level. Pivot to associated vulnerabilities or users.

 

Available
  Vulnerability Viewer

Entity Search and Analytics

 

Search and view details for individual vulnerabilities and associated devices, users and applications.

 

Details upon request